/* * JBoss, Home of Professional Open Source. * Copyright 2009, Red Hat Middleware LLC, and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.test.security.acl; import java.util.ArrayList; import java.util.List; import junit.framework.TestCase; import org.jboss.security.acl.ACLEntry; import org.jboss.security.acl.ACLEntryImpl; import org.jboss.security.acl.ACLPersistenceStrategy; import org.jboss.security.acl.ACLProvider; import org.jboss.security.acl.BasicACLPermission; import org.jboss.security.acl.CompositeACLPermission; import org.jboss.security.acl.JPAPersistenceStrategy; import org.jboss.security.acl.RoleBasedACLProviderImpl; import org.jboss.security.authorization.Resource; import org.jboss.security.identity.Identity; import org.jboss.security.identity.Role; import org.jboss.security.identity.RoleFactory; import org.jboss.security.identity.RoleGroup; import org.jboss.security.identity.plugins.IdentityFactory; /** * <p> * This {@code TestCase} tests the functionality implemented by the {@code RoleBasedACLProviderImpl} class. * </p> * * @author <a href="mailto:sguilhen@redhat.com">Stefan Guilhen</a> */ public class RoleBasedACLProviderUnitTestCase extends TestCase { private Resource[] resources; private Identity identity; private final ACLPersistenceStrategy strategy = new JPAPersistenceStrategy(); @Override protected void setUp() throws Exception { super.setUp(); // build the test resources. this.resources = new Resource[2]; for (int i = 0; i < resources.length; i++) resources[i] = new TestResource(i, "Test Resource " + i); // Identity 'john' has two roles (role1 and role2). Role role1 = RoleFactory.createRole("role1"); Role role2 = RoleFactory.createRole("role2"); RoleGroup roleGroup = RoleFactory.createRoleGroup("RoleGroup"); roleGroup.addRole(role1); roleGroup.addRole(role2); this.identity = IdentityFactory.createIdentityWithRole("john", roleGroup); // create the ACLs for the resources. ACLEntry entry1 = new ACLEntryImpl(BasicACLPermission.READ, "role1"); ACLEntry entry2 = new ACLEntryImpl( new CompositeACLPermission(BasicACLPermission.READ, BasicACLPermission.UPDATE), "role2"); ACLEntry entry3 = new ACLEntryImpl(new CompositeACLPermission(BasicACLPermission.values()), "role3"); List<ACLEntry> entries = new ArrayList<ACLEntry>(); entries.add(entry1); entries.add(entry2); entries.add(entry3); this.strategy.createACL(this.resources[0], entries); // the second ACL uses the identity name. entry1 = new ACLEntryImpl(BasicACLPermission.READ, "ritchie"); entry2 = new ACLEntryImpl(new CompositeACLPermission(BasicACLPermission.values()), "john"); entries = new ArrayList<ACLEntry>(); entries.add(entry1); entries.add(entry2); this.strategy.createACL(this.resources[1], entries); } /** * <p> * Tests the behavior of the {@code isAccessGranted} method, which uses the identity's roles to check whether * access to the resource should be granted or not. * </p> * * @throws Exception if an error occurs while running the test. */ public void testACLProvider() throws Exception { // create the RoleBasedACLProvider instance. ACLProvider provider = new RoleBasedACLProviderImpl(); provider.setPersistenceStrategy(this.strategy); // as john has role 2, he should be able to update resource 0. assertTrue(provider.isAccessGranted(this.resources[0], this.identity, BasicACLPermission.UPDATE)); // none of john's roles has DELETE permission, so he should not be able to delete resource 0. assertFalse(provider.isAccessGranted(this.resources[0], this.identity, BasicACLPermission.DELETE)); // now create a new identity for john that has no roles. The role-based provider should now use the // identity name (default impl) when checking for permissions. Identity identity = IdentityFactory.createIdentity("john"); assertTrue(provider.isAccessGranted(this.resources[1], identity, new CompositeACLPermission(BasicACLPermission .values()))); // access should be denied to resource 0, as that one has an ACL based on the roles. assertFalse(provider.isAccessGranted(this.resources[0], identity, BasicACLPermission.READ)); } }